IT Examiner School eBook

Examples of Assets to be Protected

People • Expertise, corporate memory

Hardware • CPU, routers, drives

Software • OS, applications, source code

Data • Database, files, email, backups

Documentation • Loan & deposit documents • Disclosures • Signature cards

Third Parties • Processors • Aggregators

Cloud • AWS • Salesforce • Jira

35

Identifying Asset Sensitivity

Once the assets are identified, their criticality & sensitivity must be valued

It is critical to differentiate the importance of assets so that institutions can assign priorities & appropriate controls

It is the firm’s responsibility to provide definitions for the classifications they use in their risk assessment

Management should be able to define all terms used in the risk assessment

Made with FlippingBook - Online magazine maker